Let test handshakes stop on certain errors
[openssl.git] / test / ssl-tests / 12-ct.conf
1 # Generated with generate_ssl_tests.pl
2
3 num_tests = 4
4
5 test-0 = 0-ct-permissive
6 test-1 = 1-ct-strict
7 test-2 = 2-ct-permissive-resumption
8 test-3 = 3-ct-strict-resumption
9 # ===========================================================
10
11 [0-ct-permissive]
12 ssl_conf = 0-ct-permissive-ssl
13
14 [0-ct-permissive-ssl]
15 server = 0-ct-permissive-server
16 client = 0-ct-permissive-client
17
18 [0-ct-permissive-server]
19 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
20 CipherString = DEFAULT
21 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
22
23 [0-ct-permissive-client]
24 CipherString = DEFAULT
25 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
26 VerifyMode = Peer
27
28 [test-0]
29 ExpectedResult = Success
30 client = 0-ct-permissive-client-extra
31
32 [0-ct-permissive-client-extra]
33 CTValidation = Permissive
34
35
36 # ===========================================================
37
38 [1-ct-strict]
39 ssl_conf = 1-ct-strict-ssl
40
41 [1-ct-strict-ssl]
42 server = 1-ct-strict-server
43 client = 1-ct-strict-client
44
45 [1-ct-strict-server]
46 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
47 CipherString = DEFAULT
48 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
49
50 [1-ct-strict-client]
51 CipherString = DEFAULT
52 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
53 VerifyMode = Peer
54
55 [test-1]
56 ExpectedClientAlert = HandshakeFailure
57 ExpectedResult = ClientFail
58 client = 1-ct-strict-client-extra
59
60 [1-ct-strict-client-extra]
61 CTValidation = Strict
62
63
64 # ===========================================================
65
66 [2-ct-permissive-resumption]
67 ssl_conf = 2-ct-permissive-resumption-ssl
68
69 [2-ct-permissive-resumption-ssl]
70 server = 2-ct-permissive-resumption-server
71 client = 2-ct-permissive-resumption-client
72 resume-server = 2-ct-permissive-resumption-server
73 resume-client = 2-ct-permissive-resumption-client
74
75 [2-ct-permissive-resumption-server]
76 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
77 CipherString = DEFAULT
78 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
79
80 [2-ct-permissive-resumption-client]
81 CipherString = DEFAULT
82 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
83 VerifyMode = Peer
84
85 [test-2]
86 ExpectedResult = Success
87 HandshakeMode = Resume
88 ResumptionExpected = Yes
89 client = 2-ct-permissive-resumption-client-extra
90 resume-client = 2-ct-permissive-resumption-client-extra
91
92 [2-ct-permissive-resumption-client-extra]
93 CTValidation = Permissive
94
95
96 # ===========================================================
97
98 [3-ct-strict-resumption]
99 ssl_conf = 3-ct-strict-resumption-ssl
100
101 [3-ct-strict-resumption-ssl]
102 server = 3-ct-strict-resumption-server
103 client = 3-ct-strict-resumption-client
104 resume-server = 3-ct-strict-resumption-server
105 resume-client = 3-ct-strict-resumption-resume-client
106
107 [3-ct-strict-resumption-server]
108 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
109 CipherString = DEFAULT
110 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
111
112 [3-ct-strict-resumption-client]
113 CipherString = DEFAULT
114 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
115 VerifyMode = Peer
116
117 [3-ct-strict-resumption-resume-client]
118 CipherString = DEFAULT
119 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
120 VerifyMode = Peer
121
122 [test-3]
123 ExpectedResult = Success
124 HandshakeMode = Resume
125 ResumptionExpected = Yes
126 client = 3-ct-strict-resumption-client-extra
127 resume-client = 3-ct-strict-resumption-resume-client-extra
128
129 [3-ct-strict-resumption-client-extra]
130 CTValidation = Permissive
131
132 [3-ct-strict-resumption-resume-client-extra]
133 CTValidation = Strict
134
135